Site MapHelpFeedbackChapter 10 Quiz
Chapter 10 Quiz
(See related pages)



1

The device that separates the computer or peripherals from the power source containing a circuit breaker to protect from voltage spikes is called a
A)spike breaker.
B)surge protector.
C)firewall.
D)voltage dampener.
2

One of the following is not a principle from the Code of Fair Information Practice that was recommended in 1977 as an ethical guide in the absence of existing laws covering information privacy online.
A)No secret databases
B)Right of consent
C)Assurance of reliability and proper use
D)Right of content
3

A computer virus typically is not spread from computer to computer through
A)e-mail.
B)technological failure.
C)program downloads.
D)copied floppy disks.
4

Specialized programs that are placed on a hard disk that monitor and track the user's Web activity are called
A)trackers.
B)brownies.
C)monitors.
D)cookies.
5

The most significant concerns for people who utilize computer technology are privacy, security, environment and
A)ergonomics.
B)economics.
C)ethics.
D)anonymity.
6

Unauthorized copying of software to be used for personal gain instead of for personal backups is called
A)program thievery.
B)data snatching.
C)software piracy.
D)program looting.
7

Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ________ security is concerned with protecting software from unauthorized tampering or damage.
A)data
B)cyber
C)Internet
D)metaphysical
8

The study of human factors concerning fitting the job to the worker rather than contorting the worker to fit the job is known as
A)conformance.
B)reliance testing.
C)ergonomics.
D)productivity economics.
9

A form of a repetitive strain injury common to heavy computer users that consists of damage to nerves and tendons in the hands is
A)pulled arm muscles.
B)arthritis.
C)carpal tunnel syndrome.
D)computer elbow.
10

The term used to describe stress associated with computer use that is harmful to people is
A)cybersclerosis.
B)technostress.
C)computitis.
D)technology anxiety.
11

Certain variants of a virus called worms and denial of service attacks are designed to overwhelm computer system resources to the point that they become unusable.
A)True
B)False
12

Computer monitoring software is the most invasive and dangerous type of spyware.
A)True
B)False
13

The Freedom of Information Act makes it a federal crime for unauthorized persons to view, copy, or damage data using any computer across state lines.
A)True
B)False
14

The Environmental Protection Agency created the Energy Star program to discourage waste in the microcomputer industry by setting goals to reduce power requirements for system units, monitors and printers.
A)True
B)False







Computing Essentials 2005Online Learning Center

Home > Communications and Networks Ch 10 > Multiple Choice Quiz